Description
Jenkins GitLab Branch Source Plugin 684.vea_fa_7c1e2fe3 and earlier uses a non-constant time comparison function when checking whether the provided and expected webhook token are equal, potentially allowing attackers to use statistical methods to obtain a valid webhook token.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-0341 | Jenkins GitLab Branch Source Plugin 684.vea_fa_7c1e2fe3 and earlier uses a non-constant time comparison function when checking whether the provided and expected webhook token are equal, potentially allowing attackers to use statistical methods to obtain a valid webhook token. |
Github GHSA |
GHSA-f67f-2j6r-m4c9 | Non-constant time webhook token comparison in Jenkins GitLab Branch Source Plugin |
References
History
No history.
Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2025-02-13T17:39:59.383Z
Reserved: 2024-01-23T12:46:51.265Z
Link: CVE-2024-23903
Updated: 2024-08-01T23:13:08.599Z
Status : Modified
Published: 2024-01-24T18:15:09.653
Modified: 2024-11-21T08:58:40.513
Link: CVE-2024-23903
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA